[SECURITY] [DSA 159-1] New Python packages fix insecure temporary file use

2002-08-28 Thread Martin Schulze

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

- --
Debian Security Advisory DSA 159-1 [EMAIL PROTECTED]
http://www.debian.org/security/ Martin Schulze
August 28th, 2002   http://www.debian.org/security/faq
- --

Package: python
Vulnerability  : insecure temporary files
Problem-Type   : local
Debian-specific: no

Zack Weinberg discovered an insecure use of a temporary file in
os._execvpe from os.py.  It uses a predictable name which could lead
execution of arbitrary code.

This problem has been fixed in several versions of Python: For the
current stable distribution (woody) it has been fixed in version
1.5.2-23.1 of Python 1.5, in version 2.1.3-3.1 of Python 2.1 and in
version 2.2.1-4.1 of Python 2.2.  For the old stable distribution
(potato) this has been fixed in version 1.5.2-10potato12 for Python
1.5.  For the unstable distribution (sid) this has been fixed in
version 1.5.2-24 of Python 1.5, in version 2.1.3-6a of Python 2.1 and
in version 2.2.1-8 of Python 2.2.  Python 2.3 is not affected by this
problem.

We recommend that you upgrade your Python packages immediately.

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 2.2 alias potato
- 

  Source archives:

http://security.debian.org/pool/updates/main/p/python/python_1.5.2-10potato12.dsc
  Size/MD5 checksum:  814 d4368a244ae130c0a879dc583d74ebb6

http://security.debian.org/pool/updates/main/p/python/python_1.5.2-10potato12.diff.gz
  Size/MD5 checksum:85380 cef4ee264c041385d26a6e7a914f66cf
http://security.debian.org/pool/updates/main/p/python/python_1.5.2.orig.tar.gz
  Size/MD5 checksum:  2533053 e9d677ae6d5a3efc6937627ed8a3e752

  Alpha architecture:


http://security.debian.org/pool/updates/main/p/python/python-base_1.5.2-10potato12_alpha.deb
  Size/MD5 checksum:   928612 9cbc6a1fc341c7f5668da7f14ddfd336

  ARM architecture:


http://security.debian.org/pool/updates/main/p/python/python-base_1.5.2-10potato12_arm.deb
  Size/MD5 checksum:   848442 778e22c98169028d94ba9fe3634dd113

  Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/p/python/python-base_1.5.2-10potato12_i386.deb
  Size/MD5 checksum:   825052 a2b34f89248287e5f61e1a9ae051b6ae

  Motorola 680x0 architecture:


http://security.debian.org/pool/updates/main/p/python/python-base_1.5.2-10potato12_m68k.deb
  Size/MD5 checksum:   837528 55065573b7ed3b5f19ced5bb35cc

  PowerPC architecture:


http://security.debian.org/pool/updates/main/p/python/python-base_1.5.2-10potato12_powerpc.deb
  Size/MD5 checksum:   872370 6e45dfbc1694e89f4707e1803f65943a

  Sun Sparc architecture:


http://security.debian.org/pool/updates/main/p/python/python-base_1.5.2-10potato12_sparc.deb
  Size/MD5 checksum:   854034 3ef80fbe6213c198d713046a4405cdff


Debian GNU/Linux 3.0 alias woody
- 

  Source archives:

http://security.debian.org/pool/updates/main/p/python1.5/python1.5_1.5.2-23.1.dsc
  Size/MD5 checksum:  916 59cda94465a7108d34294050e141b0ba

http://security.debian.org/pool/updates/main/p/python1.5/python1.5_1.5.2-23.1.diff.gz
  Size/MD5 checksum:   147550 0246bc4b24874e3c0f8b6c6af47b262d

http://security.debian.org/pool/updates/main/p/python1.5/python1.5_1.5.2.orig.tar.gz
  Size/MD5 checksum:  2533570 d9ade0d7613466e0353561d277ff02fe
http://security.debian.org/pool/updates/main/p/python2.1/python2.1_2.1.3-3.1.dsc
  Size/MD5 checksum: 1283 2193a191f73cac617edc851ce1dc0874

http://security.debian.org/pool/updates/main/p/python2.1/python2.1_2.1.3-3.1.diff.gz
  Size/MD5 checksum:70192 eacc3d64dd0717ecf47fb2793a6b94c2

http://security.debian.org/pool/updates/main/p/python2.1/python2.1_2.1.3.orig.tar.gz
  Size/MD5 checksum:  6194246 1ae739aa5824de263923df3516eeaf80
http://security.debian.org/pool/updates/main/p/python2.2/python2.2_2.2.1-4.1.dsc
  Size/MD5 checksum: 1150 029ee1aa079f8884283d57d765889d37

http://security.debian.org/pool/updates/main/p/python2.2/python2.2_2.2.1-4.1.diff.gz
  Size/MD5 checksum:91682 de92eb806eea24f0a00289a9179cce7a

http://security.debian.org/pool/updates/main/p/python2.2/python2.2_2.2.1.orig.tar.gz
  Size/MD5 checksum:  6536167 88aa07574673ccfaf35904253c78fc7d

  Alpha architecture:



Re: cryptoloop confusion

2002-08-28 Thread Ivo Timmermans
Jeff wrote:
 I've decided to learn how to setup an encrypted filesystem using the
 cryptoloop method and I'm having troubles getting my kernal source
 patched correctly.  I've read the Loopback Encrypted Filesystem
 HOWTO, but it's outdated.  Here are a number of patches for kernel
 2.4.18 and I'm confused as to which one(s) to use.  

Could you try my cryptoapi packages?  They're waiting to be accepted
into unstable, so you can't get to them directly, but i uploaded them
to my private repository as well:

http://home.o2w.net/~ivo/debian/

I'm very curious to hear if these packages have the same problem.

BTW, kernel-patch-int is deprecated, you should be using cryptoapi, so
you should install the 'cryptoapi-core-source' and 'cryptoloop-source'
packages from my site.


Ivo

-- 
tarzeau the internet is so big, and full of nothing i want



RE: cryptoloop confusion

2002-08-28 Thread DEFFONTAINES Vincent
It seems to me, you need not only the patch-int , but also the loop patch,
which can be found at
ftp://ftp.kernel.org/pub/linux/crypto/v2.4/testing/loop-hvr-2.4.18.0.patch
You have to use it else the cryptoloop compile part fails.
Why the loop patch is not included in the patch-int patch, I do not know.

Vincent


 -Original Message-
 From: Jeff [mailto:[EMAIL PROTECTED]
 Sent: Wednesday 28 August 2002 00:38
 To: debian security list
 Subject: cryptoloop confusion
 
 
 I've decided to learn how to setup an encrypted filesystem using the
 cryptoloop method and I'm having troubles getting my kernal source
 patched correctly.  I've read the Loopback Encrypted Filesystem
 HOWTO, but it's outdated.  Here are a number of patches for kernel
 2.4.18 and I'm confused as to which one(s) to use.  
 
 I've patched using patch-int-2.4.18.2.bz2 successfully, but my
 compile fails at the cryptoloop part.  
 
 I've tried using the make patch-kernel ... to patch with
 cryptoloop-0.0.1-pre1.tar.gz and cryptoapi-0.1.0-rc1.tar.gz, both of
 which failed:
 
 root # cd /usr/src/cryptoloop-0.0.1-pre1
 root # make patch-kernel KDIR=/usr/src/linux-2.4.18_crypt
 LOOP=iv
 cp -pf /usr/src/linux-2.4.18_crypt/Rules.make .
 rm -f arch/
 ln -s /usr/src/linux-2.4.18_crypt/arch .
 rm -f include/
 ln -s /usr/src/linux-2.4.18_crypt/include .
 make -f Makefile.modules KDIR=/usr/src/linux-2.4.18_crypt version
 make[1]: Entering directory `/usr/src/cryptoloop-0.0.1-pre1'
 make[1]: Leaving directory `/usr/src/cryptoloop-0.0.1-pre1'
 cd patches  ./findpatch.pl /usr/src/linux-2.4.18_crypt iv
 patching file linux-2.4.16/drivers/block/loop.c
 patching file linux-2.4.16/include/linux/loop.h
 cp: cannot stat
 `/usr/src/linux-2.4.18_crypt/crypto/drivers/Config.in': No such file
 or directory
 /bin/sh: /usr/src/linux-2.4.18_crypt/crypto/drivers/Config.in: No such
 file or directory
 `cryptoloop.c' - `/usr/src/linux-2.4.18_crypt/crypto/drivers'
 cp: accessing `/usr/src/linux-2.4.18_crypt/crypto/drivers/Makefile':
 Not a directory
 make: *** [patch-kernel] Error 1
 
 and...
 
 root # cd /usr/src/cryptoapi-0.1.0-rc1
 root # make patch-kernel KDIR=/usr/src/linux-2.4.18_crypt
 LOOP=iv
 cp -pf /usr/src/linux-2.4.18_crypt/Rules.make .
 rm -f arch/
 ln -s /usr/src/linux-2.4.18_crypt/arch .
 rm -f include/
 ln -s /usr/src/linux-2.4.18_crypt/include .
 make -f Makefile.modules KDIR=/usr/src/linux-2.4.18_crypt  version
 make[1]: Entering directory `/usr/src/cryptoapi-0.1.0-rc1'
 make[1]: Leaving directory `/usr/src/cryptoapi-0.1.0-rc1'
 touch check.stamp
 cp -R kernel/crypto /usr/src/linux-2.4.18_crypt
 cp: cannot overwrite non-directory
 `/usr/src/linux-2.4.18_crypt/crypto/drivers' with directory
 `kernel/crypto/drivers'
 make: *** [patch-kernel] Error 1
 
 I'm googling and looking at all the docs in the patches, but I'm not
 finding clear answers yet.
 
 If someone can shed some light on which patch(es) I need and the order
 I need to apply them, and any other important pieces I'd really
 appreciate it.
 
 thanks,
 jc
 
 --
 Jeff Coppock  Systems Engineer
 Diggin' DebianAdmin and User
 
 
 -- 
 To UNSUBSCRIBE, email to [EMAIL PROTECTED]
 with a subject of unsubscribe. Trouble? Contact 
 [EMAIL PROTECTED]
 



Re: Mail relay attempts

2002-08-28 Thread Michael Renzmann

Hi Dale.

Dale Amon wrote:

The only thing you can do is to make damn certain your box does not become
part of the problem.

I'll add to that: make sure you actually check your logs. I use syslog-ng to
bring all essential realtime logging to a hardened server; 


I'll add another one to that: I started using syslogd-sql, which is a 
modified version of the syslog 1.4.1 that also allows logging to a 
MySQL database. I hope it is a step in the right direction to use 
advances SQL queries in order to support analyzation of logfiles. Any 
opinions on that from the more experiences ones on this list? :)


Bye, Mike



Re: Mail relay attempts

2002-08-28 Thread Michael Renzmann

Hi.

Jones, Steven wrote:

Ive found port sentry really good for detecting port scans and then routeing
the return packets to no where.


As an addition to that idea: would it be possible to cause similar 
effects to HTTP-server worms with a modified tarpit? Maybe a modified 
version of the kernel httpd: whenever a worm attack drops in the 
response will be a normal website containing a bogus content (no 404), 
coming over the line character by character with a huge delay. Comments?


Bye, Mike



Re: debian-security-announce-$lang@lists?

2002-08-28 Thread vdongen
 I think as a German I'm allowed to say this:
 
 No English, no security. There will always be bits and pieces
 available
 in English only. Making DSAs available in foreign languages will help
 amateurs without sufficient English skills to keep their systems up
 to date.
It might even help professionals, because although I have no problem 
with understanding english (and even german if required) reading a 
email in the Dutch language is less strenuous.

 
 For professionals, required reading is debian-security (or whatever
 foo-security list applies to their system), BUGTRAQ, maybe
 full-disclosure if you can stand it ;-), and some other mailing
 lists. 
Agreed, although it's a lot of emails a day if you are on all 3 
mailinglists.

Ivo van Dongen


[EMAIL PROTECTED]:~$ apt-cache show clue
Package: clue
Priority: optional





Re: [SECURITY] [DSA 159-1] New Python packages fix insecure temporary file use

2002-08-28 Thread Siegbert Baude
Hi,

after an apt-get update on my potato box, the following happens:

wurm:~# apt-get upgrade
Reading Package Lists... Done
Building Dependency Tree... Done
The following packages have been kept back
  python-base python-tk
0 packages upgraded, 0 newly installed, 0 to remove and 2 not upgraded.
wurm:~#


Why are the new python packages kept back?

Ciao
Siegbert



Re: [SECURITY] [DSA 159-1] New Python packages fix insecure temporary file use

2002-08-28 Thread Siegbert Baude
Hi Matt,

 Ah, I missed the part where you said this was a potato system.  It
looks
 like you are installing woody security updates on a potato system.
You
 probably have a line like this:

 deb http://security.debian.org/ stable/updates main

 in /etc/apt/sources.list.  Since Debian 3.0 (woody) is now 'stable',
you are
 getting the wrong security updates.  You can either upgrade to woody
 (recommended), or change this line to read:

 deb http://security.debian.org/ potato/updates main

 so that you will receive updates for potato when they are available.

You're right, that line pointed to stable instead of potato.
Thanks a lot for your help and time. :-)

Ciao
Siegbert



unsubscribe

2002-08-28 Thread Oliver Drechsler

thx



Re: Mail relay attempts

2002-08-28 Thread Peter Cordes
On Wed, Aug 28, 2002 at 11:56:24AM +0200, Michael Renzmann wrote:
 Hi.
 
 Jones, Steven wrote:
 Ive found port sentry really good for detecting port scans and then 
 routeing
 the return packets to no where.
 
 As an addition to that idea: would it be possible to cause similar 
 effects to HTTP-server worms with a modified tarpit? Maybe a modified 
 version of the kernel httpd: whenever a worm attack drops in the 
 response will be a normal website containing a bogus content (no 404), 
 coming over the line character by character with a huge delay. Comments?

 I remember hearing about people doing exactly that.  Maybe it was mentioned
on /. or the local LUG mailing list (http://nslug.ns.ca/).

-- 
#define X(x,y) x##y
Peter Cordes ;  e-mail: X([EMAIL PROTECTED] , ns.ca)

The gods confound the man who first found out how to distinguish the hours!
 Confound him, too, who in this place set up a sundial, to cut and hack
 my day so wretchedly into small pieces! -- Plautus, 200 BCE



Permissions Required On hosts.allow ?

2002-08-28 Thread Nick Boyce
[hope this isn't too lame a question for this list]

I decided to start locking down permissions on sensitive files on a
recently installed Woody box, and discovered that when I changed the
permissions on hosts.allow (and hosts.deny) to 640 then I could no
longer Telnet into the box from the permitted IP address (never mind
denied addresses).  /var/log/daemon.log had messages in it to the
effect that tcpd couldn't read hosts.allow, so was denying the
connection.

So I've opened perms up to 644 again, but this seems the wrong thing
to do.  I realise I was only gaining a minor layer of
security-thru-obscurity, but every little helps - surely we don't want
this file to be world-readable ?

I note from inetd.conf that in.telnetd runs as uid.gid
telnetd.telnetd, whereas hosts.allow has uid.gid root.root, which I
guess is the cause of this.  Can I change this around a bit to achieve
my goal - maybe make a new group called foo (say) and give that gid
to in.telnetd and hosts.allow ... ?

[ BTW: I *do* use SSH for all network access - I only have 127.0.0.1
listed for in.telnetd in hosts.allow, to allow myself to telnet 0 -
sometimes I like to start a new session like that, and ssh takes so
much longer to start up a session ... ]

TIA,
Nick Boyce
Bristol, UK
--
The universe is entering maintenance mode in 2 minutes. Please logout.
  -- Your administrator



Re: Permissions Required On hosts.allow ?

2002-08-28 Thread Jason Clarke
Nick,

I found that SSHd was being unreasonably slow in authorising logins..

Found the problem to be that SSH was doing DNS lookups on IP's.

So I setup an internal reverse DNS for my local lan, and shebang, it's
almost instant now.

Jason

- Original Message -
From: Nick Boyce 
To: debian-security@lists.debian.org
Sent: Thursday, August 29, 2002 11:51 AM
Subject: Permissions Required On hosts.allow ?


[hope this isn't too lame a question for this list]

I decided to start locking down permissions on sensitive files on a
recently installed Woody box, and discovered that when I changed the
permissions on hosts.allow (and hosts.deny) to 640 then I could no
longer Telnet into the box from the permitted IP address (never mind
denied addresses).  /var/log/daemon.log had messages in it to the
effect that tcpd couldn't read hosts.allow, so was denying the
connection.

So I've opened perms up to 644 again, but this seems the wrong thing
to do.  I realise I was only gaining a minor layer of
security-thru-obscurity, but every little helps - surely we don't want
this file to be world-readable ?

I note from inetd.conf that in.telnetd runs as uid.gid
telnetd.telnetd, whereas hosts.allow has uid.gid root.root, which I
guess is the cause of this.  Can I change this around a bit to achieve
my goal - maybe make a new group called foo (say) and give that gid
to in.telnetd and hosts.allow ... ?

[ BTW: I *do* use SSH for all network access - I only have 127.0.0.1
listed for in.telnetd in hosts.allow, to allow myself to telnet 0 -
sometimes I like to start a new session like that, and ssh takes so
much longer to start up a session ... ]

TIA,
Nick Boyce
Bristol, UK
--
The universe is entering maintenance mode in 2 minutes. Please logout.
  -- Your administrator




Re: Permissions Required On hosts.allow ?

2002-08-28 Thread Indra Kusuma
On Thu, 29 Aug 2002, Jason Clarke wrote:

# Found the problem to be that SSH was doing DNS lookups on IP's.
#
# So I setup an internal reverse DNS for my local lan, and shebang, it's
# almost instant now.

use -u0 on the sshd option

Cheers,

Indra Kusuma
--
 ,''`. Indra{@,.}Kusuma.OR.ID - [personal - Debian/GNU Linux - IPv6]
: :' : 0x4D829E49 - 187D 8C98 FB76 E1A8 5558 853A 4795 4FC1 4D82 9E49
`. `'
  `-